Open Access
The Secure Sockets Layer (SSL) Protocol Version 3.0
Alan O. Freier,Philip Karlton,Paul C. Kocher +2 more
- Vol. 6101, pp 1-67
Reads0
Chats0
TLDR
This document specifies Version 3.0 of the Secure Sockets Layer protocol, a security protocol that provides communications privacy over the Internet that is designed to prevent eavesdropping, tampering, or message forgery.Abstract:
This document specifies Version 3.0 of the Secure Sockets Layer (SSL
V3.0) protocol, a security protocol that provides communications
privacy over the Internet. The protocol allows client/server
applications to communicate in a way that is designed to prevent
eavesdropping, tampering, or message forgery.read more
Citations
More filters
Prying open Pandora's box: KCI attacks against TLS
TL;DR: The insecure TLS options that enable KCI attacks should be immediately disabled in TLS clients and removed from future versions and implementations of the protocol: their utility is extremely limited, their raison d'etre is practically nil, and the existence of these insecure key agreement options only adds to the arsenal of attack vectors against cryptographically secured communication on the Internet.
Proceedings ArticleDOI
Enhancement of GSM Security Using Elliptic Curve Cryptography Algorithm
TL;DR: This paper will be focusing on the comparison of working procedure of elliptic curve cryptography and RSA algorithm in GSM network to how it's a better promise for a faster and more secure method of encryption in comparison to the current standards in the Public-Key Cryptographic algorithms of RSA.
Patent
Cryptographic proxy service
TL;DR: In this article, the plurality of data associated with a network destination is encrypted according to the security certificate associated with the network destination and provided to the cryptographic service for re-encryption and transmission to the destination.
Proceedings ArticleDOI
Secure and Efficient Cloud Computing Framework
TL;DR: A cloud computing framework that classifies the data based on their importance so that more important data will be encrypted with more secure encryption algorithm and larger key sizes, while less important data might even not be encrypted.
Posted Content
Certificate Transparency Using Blockchain.
TL;DR: This paper proposes a novel system, called CTB, that makes it impossible for a CA to issue a certificate for a domain without obtaining consent from the domain owner, and makes progress to equip CTB with certificate revocation mechanism.
References
More filters
Journal ArticleDOI
New Directions in Cryptography
TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Proceedings Article
The MD5 Message-Digest Algorithm
TL;DR: This document describes the MD5 message-digest algorithm, which takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.
XDR: External Data Representation Standard
TL;DR: This document describes the External Data Representation Standard (XDR) protocol as it is currently deployed and accepted.